Certainly! Here’s version 110 of the rewritten blog post title: I’m Nick Percoco, leading security at Kraken, creator of SpiderLabs at Trustwave, and organizer of Chicago’s THOTCON hacker event. Feel free to ask me about crypto security breaches, hacking incidents, cybersecurity strategies, and investigative techniques.

Insights from a Cybersecurity Veteran: A Conversation with Nick Percoco

Welcome to today’s blog post, where we have the pleasure of introducing Nick Percoco, a distinguished figure in the field of cybersecurity with over 25 years of experience. As the Chief Security Officer at Kraken—a leading global digital asset exchange—Nick brings a wealth of knowledge on security challenges, particularly those relating to cryptocurrency and technology.

Nick’s illustrious career began at a young age; he discovered his passion for technology when he learned to code at just seven years old on a Timex Sinclair 1000. His journey continued through the vibrant Chicago hacker scene of the late 80s and 90s, where the Commodore 64 and Intel 386 PC running Linux were his trusted companions.

Before his tenure at Kraken, Nick served as Chief Security Officer at Uptake, an industrial AI firm, and held the position of Vice President of Global Services at Rapid7, a well-respected cybersecurity company. His insights into security breaches, malware, and information security trends have garnered him invitations to prominent conferences like Black Hat, DEF CON, and OWASP, where he has shared his expertise with peers and dignitaries, including representatives from the Department of Homeland Security, the US-CERT, Interpol, and the United States Secret Service.

Nick is also known for founding SpiderLabs at Trustwave and spearheading THOTCON, an annual hacker conference in Chicago, which will see its 12th edition in 2023. His commitment to advancing cybersecurity extends to constructing robust programs at Kraken to fend off potential threats to the cryptocurrency exchange.

This blog post is an invitation for you to learn from Nick’s extensive experience. Whether you’re curious about the nuances of cryptocurrency hacks, general security advice, or the latest trends in cybersecurity investigations, Nick is here to share his insights. Feel free to explore his thoughts and ask any questions you may have!

In his own words: “I’m here to answer anything about my experience, insights on the industry, and more. Ask me anything!”

Stay tuned, as Nick enjoys engaging in discussions and is excited to connect with you all. Check back for responses to the questions he finds intriguing!

Share this content:

One Comment

  1. Technical Support Response to Cybersecurity Inquiry

    Hello Nick,

    Thank you for sharing your extensive experience and insights in cybersecurity. If you’re encountering specific technical issues or need assistance related to your cybersecurity infrastructure, here are some general recommendations:

    • Implement Multi-Factor Authentication (MFA): Ensure that all critical systems, especially those handling cryptocurrency transactions, have MFA enabled to add an extra layer of security.
    • Regular Security Audits: Conduct comprehensive vulnerability assessments and penetration testing, particularly on your crypto exchange platforms, to identify and mitigate potential exploits.
    • Stay Updated with Threat Intelligence: Leverage threat intelligence feeds and cybersecurity platforms to stay informed about the latest malware, phishing campaigns, and attack vectors targeting cryptocurrency firms.
    • Use Secure Coding Practices: When developing or maintaining your security tools or applications, follow secure coding standards to prevent common vulnerabilities like SQL injection or cross-site scripting.
    • Monitoring and Incident Response: Implement real-time monitoring systems (SIEM solutions) to detect suspicious activities promptly and have a well-defined incident response plan in place.

    If you have specific technical issues or need tailored advice

Leave a Reply

Your email address will not be published. Required fields are marked *